Follow us on Twitter
twitter icon@FreshPatents


Reverse Engineering patents

      

This page is updated frequently with new Reverse Engineering-related patent applications.




 Apparatus and  managing unity file in a mobile platform patent thumbnailApparatus and managing unity file in a mobile platform
The present invention relates to managing a unity file in a mobile platform in order to forestall a unity library executable in a mobile platform from being analyzed by reverse engineering and decompiling and provides an apparatus for managing a unity file in a mobile platform comprising a file extracting section that extracts a unity library file from a unity application; an encrypting section that encrypts a programming library file in the unity library file thus extracted and creates an encrypted programming library file; a file creating section that creates a decrypting library to decrypt the encrypted programming library file and creates a secured unity application using the decrypting library and the encrypted programming library file; and a file executing section that, upon request to execute the secured unity application, executes the secured application by decrypting the encrypted programming library file using the decrypting library.. .
Seworks, Inc.


 Exploiting the scan test interface for reverse engineering of a vlsi device patent thumbnailExploiting the scan test interface for reverse engineering of a vlsi device
A computerized method of creating a circuit logic model of a vlsi device, comprising mapping a plurality of logic function patterns of one or more circuits of a vlsi device through a plurality of probe iterations and generating a circuit logic model of the circuit(s) by reconstructing a logical function of a combinatorial logic of the circuit(s) based on analysis of the logic function patterns. Each of the probe iteration comprises switching between scan shift mode and functional mode of the vlsi device such that while the vlsi device operates in scan shift mode register(s) associated with the circuit(s) is accessed and while the vlsi device operates in functional mode external pin(s) of the vlsi device associated with the circuit(s) is probed and mapping a respective one of the logic function patterns according to a logic state of one or more bits in the register(s) and/or the external pin(s)..
Technion Research & Development Foundation Limited


 Automated identification and reverse engineering of malware patent thumbnailAutomated identification and reverse engineering of malware
An automated malware identification and reverse engineering tool is provided. Subroutine categories may be learned by machine learning.
Los Alamos National Security, Llc


 System, method and computer-accessible medium for security-centric electronic system design patent thumbnailSystem, method and computer-accessible medium for security-centric electronic system design
An exemplary system, method and computer-accessible medium can be provided which can include, for example, generating a super control dataflow graph(s) (cdfg) by applying a plurality of electronic system level esl design constraints associated with an integrated circuit, determining an upper bound(s) number and a lower bound(s) number based on a number of cdfgs in the super cdfg(s)—with each number being one metric of a capability of the integrated circuit to resist reverse engineering attack—, and inserting a component(s) into a register transfer level netlist to effectuate a modification of the upper bound(s) and the lower bound(s).. .
New York University


 Multi-tiered tamper-resistant assembly system and method patent thumbnailMulti-tiered tamper-resistant assembly system and method
A multi-tiered approach to combating reverse engineering of electronics is disclosed herein. The encapsulant utilized with the optical sensor may be selected based on being substantially being opaque to x-ray inspection.
Sensors Unlimited, Inc.


 User terminal and  protecting core codes of applications using the same patent thumbnailUser terminal and protecting core codes of applications using the same
A user terminal includes a communication circuit, an encryption-decryption circuit, and an execution circuit. The communication circuit receives a core code file of an application from a peripheral device, which stores the core code file of the application, when certifying a core code of the application.
Soongsil University Research Consortium Techno-park


 Systems and methods of processing data associated with detection and/or handling of malware patent thumbnailSystems and methods of processing data associated with detection and/or handling of malware
The present disclosure relates to malware and, more particularly, towards systems and methods of processing information associated with detecting and handling malware. According to certain illustrative implementations, methods of processing malware are disclosed.
Mcafee Ireland Holdings Limited


 Secure app update server and secure application programming interface (Secure app update server and secure application programming interface ("api") server
A coupled set of servers in a server system protect an application programming interface (“api”) from unwanted automation facilitated by unauthorized reverse engineering of an endpoint app or communications channel used by the endpoint app. The server system comprises at least one secure app update server that transforms an app code object received from an enterprise app server into a transferred app code object, and at least one secure application programming interface (“api”) server that interacts with an endpoint device that executes the transformed app code object.
Shape Security, Inc.


 Media client device authentication using hardware root of trust patent thumbnailMedia client device authentication using hardware root of trust
A client device for media playback includes a user-installable media client application which implements the client-side of a digital rights management (drm) system. The client device employs secure boot and verifies the user-installed application.
Azuki Systems, Inc.


 Apparatus and  managing apk file in an android platform patent thumbnailApparatus and managing apk file in an android platform
The present invention relates to an apparatus for managing an apk file in the android platform in order to forestall an executable file in an apk file from being analyzed by reverse engineering or decompiling that comprises a file reader that reads an original .dex file in the apk file, a file modifier that modifies the original .dex file the file reader has read and stores the modified .dex file in a readable folder in the apk file, a file creator that accesses the folder to read and restore the original .dex file, creates a temporary .dex file that is can be loaded onto memory and adds the temporary .dex file to the apk file in order to create a protected apk file and a file executer that reads from the folder and restores, if the android platform requests the protected apk file to be executed, the modified original .dex file by executing the temporary .dex file and loads the restored original .dex file onto memory in order to execute the protected apk file.. .
Seworks, Inc.


Visual tool for reverse engineering software components

A system and method of displaying a software application using a software architecture tool that includes: receiving a portion of an existing software application at the software architecture tool; identifying one or more software components of the existing software application from the received portion; automatically identifying a tier and layer location for each standard software component; and presenting one or more images that each represent the standard software component to a user, wherein the images visually identify a tier and layer location of each standard software component.. .
General Motors Llc

Systems and methods for enhancing confidentiality via logic gate encryption

Presented are systems and methods that allow hardware designers to protect valuable ip and information in the hardware domain in order to increase overall system security. In various embodiments of the invention this is accomplished by configuring logic gates of existing logic circuitry based on a key input.
Maxim Integrated Products, Inc.

Semiconductor device having features to prevent reverse engineering

It is desirable to design and manufacture electronic chips that are resistant to modern reverse engineering techniques. Disclosed is a method and device that allows for the design of chips that are difficult to reverse engineer using modern teardown techniques.
Secure Silicon Layer, Inc.

Fine-grained address space layout randomization

A data processing system can use a method of fine-grained address space layout randomization to mitigate the system's vulnerability to return oriented programming security exploits. The randomization can occur at the sub-segment level by randomizing clumps of virtual memory pages.
Apple Inc.

Aslr map obfuscation

A data processing system can use a method of fine-grained address space layout randomization to mitigate the system's vulnerability to return oriented programming security exploits. The randomization can occur at the sub-segment level by randomizing clumps of virtual memory pages.
Apple Inc.

Method for fabrication of an integrated circuit rendering a reverse engineering of the integrated circuit more difficult and corresponding integrated circuit

An integrated circuit includes a substrate with several functional blocks formed thereon. At least two identical functional blocks are respectively disposed at two or more different locations on the integrated circuit.
Stmicroelectronics (rousset) Sas

More external storage of medical device program design parameters

Many electronic medical devices include program design features that direct the operation of the device. The program design features of most electronic medical devices reside in the device itself and therefore are easily discovered by reverse engineering.

Secure semiconductor device having features to prevent reverse engineering

An encryption circuit for receiving an input of a first digital key and plaintext data, the encryption circuit for mathematically manipulating the digital key and the plaintext data to encrypt the plaintext data into encrypted data, wherein at least a portion of the encryption circuit comprises ibg circuitry. A decryption circuit for receiving an input of a second digital key and the encrypted data, the decryption circuit for mathematically manipulating the digital key and the encrypted data to decrypt the encrypted data into the plaintext data, wherein at least a portion of the decryption circuit comprises ibg circuitry.
Verisiti, Inc.

Securing microprocessors against information leakage and physical tampering

A processor system comprising: performing a compilation process on a computer program; encoding an instruction with a selected encoding; encoding the security mutation information in an instruction set architecture of a processor; and executing a compiled computer program in the processor using an added mutation instruction, wherein executing comprises executing a mutation instruction to enable decoding another instruction. A processor system with a random instruction encoding and randomized execution, providing effective defense against offline and runtime security attacks including software and hardware reverse engineering, invasive microprobing, fault injection, and high-order differential and electromagnetic power analysis..
Bluerisc Inc.

Semiconductor device having features to prevent reverse engineering

A rom circuit includes a first n channel transistor having an output and having device geometry and device characteristics adapted to bias the output at a predetermined level when a p channel circuit is connected to the first n channel transistor; a pass transistor connected between the output and a data bus, the pass transistor connected to a word line, the word line adapted to turn on the pass transistor when the word line is asserted; and the p channel circuit connected to the data bus and adapted to provide leakage current to charge a gate in the first n channel transistor when pass transistor is turned on.. .
Verisiti, Inc.

Individualised voltage supply of integrated circuits components as protective means against side channel attacks

A semiconductor device, in particular an integrated circuit with protection against side channel attacks, in particular imaging- and probing-based attacks, ema and reverse engineering, in which a metallic conductive layer of a first (104) and/or a second potential supply line (106) are each connected directly and individually to all the circuit components via respective individual conductor path structures (v1, v2).. .
Ihp Gmbh - Innovations For High Performance Microelectronics / Leibniz-institut FÜr Innovative

Protecting software through a fake cryptographic layer

The fake cryptographic layer obfuscation technique can be used to lure an attacker into expending reverse engineering efforts on sections of code the attacker would normally ignore. To do this the obfuscation technique can identify sections of code that are likely to be of lesser interest to the attacker and disguise them as higher value sections.
Apple Inc.

Semiconductor device having features to prevent reverse engineering

An electronic device includes: a base layer; a first layer located at least partially over the base layer; a second layer located at least partially over the first layer; a first metal layer located at least partially over the second layer, wherein one or more signal outputs of the electronic device are formed in the first metal layer; and a second metal layer located at least partially over the first metal layer, wherein one or more gate connection is formed in the second metal layer, wherein removing a portion of the second metal layer disrupts at least one gate connection and deactivates the device.. .
Secure Silicon Layer, Inc.

Methods for defending static and dynamic reverse engineering of software license control and devices thereof

The technique relates to a method for defending static and dynamic reverse engineering of software license control and devices thereof. To defend static reverse engineering of software license control the licensed application is wrapped with encryption wrapper, wherein the encryption wrapper encrypts the application with a first password.
Infosys Limited

Method, system and device for protection against reverse engineering and/or tampering with programs

Unauthorized use of computer programs is made difficult by compiling a processor rather than just compiling a program into machine code. The way in which the processor should respond to machine instructions, i.e.
Koninklijke Philips N.v.

Semiconductor device having features to prevent reverse engineering

An electronic device includes: a base layer; a first layer located at least partially over the base layer; a second layer located at least partially over the first layer; a first metal layer located at least partially over the second layer, wherein one or more signal outputs of the electronic device are formed in the first metal layer; and a second metal layer located at least partially over the first metal layer, wherein one or more gate connection is formed in the second metal layer, wherein removing a portion of the second metal layer disrupts at least one gate connection and deactivates the device.. .
Secure Silicon Layer, Inc.

Secure semiconductor device having features to prevent reverse engineering

An encryption circuit for receiving an input of a first digital key and plaintext data, the encryption circuit for mathematically manipulating the digital key and the plaintext data to encrypt the plaintext data into encrypted data, wherein at least a portion of the encryption circuit comprises ibg circuitry. A decryption circuit for receiving an input of a second digital key and the encrypted data, the decryption circuit for mathematically manipulating the digital key and the encrypted data to decrypt the encrypted data into the plaintext data, wherein at least a portion of the decryption circuit comprises ibg circuitry.
Static Control Components, Inc.

Reporting tools for object-relational databases

A view schema is generated from a view definition, wherein the view schema includes one or more relational views that are created by translating one or more object queries in the view definition into one or more relational queries. A report design schema is generated from the view definition by: creating one or more report tables that correspond to the one or more relational views of the view schema and extending the one or more report tables with one or more primary key constraints and one or more foreign key constraints.
International Business Machines Corporation

Reporting tools for object-relational databases

A view schema is generated from a view definition, wherein the view schema includes one or more relational views that are created by translating one or more object queries in the view definition into one or more relational queries. A report design schema is generated from the view definition by: creating one or more report tables that correspond to the one or more relational views of the view schema and extending the one or more report tables with one or more primary key constraints and one or more foreign key constraints.
International Business Machines Corporation

Detecting co-occurrence patterns in dns

Techniques for inferring the existence of suspicious software by detecting multiple name server requests for the same sets of non-existent domains. Implementations can allow for detecting the existence of malware or other suspicious software without requiring reverse engineering of the malware's domain generation algorithm..
Verisingn, Inc.

System and managing genomic information

Various embodiments provide interfaces to access genomic testing information and incorporate it into daily physician practice. According to one aspect, a graph-based data model is used that may be used to organizes and revise precision medicine knowledge.
Foundation Medicine, Inc.

System and managing genomic information

Various embodiments provide interfaces to access genomic testing information and incorporate it into daily physician practice. According to one aspect, a graph-based data model is used that may be used to organizes and revise precision medicine knowledge.
Foundation Medicine, Inc.

Method for protecting an application program and related computer program product

A method for protecting an application program executable on a computer against reverse engineering, said application is created to run with at least one selected dynamic link library (dll) on said computer, comprises the steps of: adding a specific library loader to the executable application program, said loader either contains or has access to said dynamic link library; setting modified references to said dynamic link library such that upon loading said application program and said loader into the main memory of said computer, said dynamic link library is initialized by said library loader instead of the operating system; the library loader and the pseudo-statically linked library could be embedded into the application program, thereby using unused space within the application. The protected application presents itself as a monolithic application without the vulnerable interface to a dll..

Reverse event signature for identifying hit and run vehicles

Identifying a vehicle involved in a hit-and-run accident may comprise generating a damage signature associated with a first vehicle that is left behind with collision damage in a hit-and-run accident. A reverse event signature may be generated that indicates a position of impact and severity of damage associated with a second vehicle involved in the hit-and-run accident that fled a scene of the hit-and-run accident.
International Business Machines Corporation

Reverse event signature for identifying hit and run vehicles

Identifying a vehicle involved in a hit-and-run accident may comprise generating a damage signature associated with a first vehicle that is left behind with collision damage in a hit-and-run accident. A reverse event signature may be generated that indicates a position of impact and severity of damage associated with a second vehicle involved in the hit-and-run accident that fled a scene of the hit-and-run accident.
International Business Machines Corporation

Method of laser processing mold surface

A method of laser processing a mold surface may include a first stage of extracting mapping data for forming an embossing pattern on the mold surface using laser processing, a second stage of extracting scanning data obtained by scanning the mold surface and matching the scanning data with the mapping data so as to extract processing data for laser processing, a third stage of performing a reverse engineering process for previously verifying error between measured data of the mold surface and the processing data when processing the mold surface to form the embossing pattern using the processing data, and a fourth stage of, when the error may be within an allowable tolerance, performing the laser process using a verified processing data.. .
Hyundai Motor Company

System and implementing database replication configurtions using replication modeling and transformation

A reverse engineering database replication data system is disclosed. In one embodiment, the replication data system receives an input of replication configuration data for a plurality of databases and builds memory models based on metadata accessed from the plurality of databases, which are then transformed to a first platform-specific replication model.

System and determining retail-business-rule coefficients from current prices

Business rules can govern a single price or they can define relationships between different products involving two or more decision prices. One problem that retailers can face is that business rules are generally not codified and are rarely followed consistently, and thus it can be difficult to articulate existing business rules or generate new business rules.

Trading style automated analysis and reverse engineering

A decision logic communicating with said processing logic, said decision logic having a repository for storing a set of buy/sell rules for buying and selling securities in response to said buy and sell data, said market news data, and said model trader order and execution data.. .

Split data exchange protocol

Embodiments of the invention include a system to manage software and protect it from reverse engineering and intrusion prevention. A security server stores server-side software and server-side keys for various software products.

Two plasmid mammalian expression system

reverse engineering has offered new ways of studying the pathology of rna viral infections, new more efficient devices of synthesizing recombinant viruses and developing vaccines and also demonstrated the versatility and efficiency of rna dependent rna polymerase rdrp system as an expression system. However, the currently used methods require a repertoire of complex, difficult-to-use tools.

Systems and methods for detecting and mitigating programmable logic device tampering

Systems and methods are disclosed for preventing tampering of a programmable integrated circuit device. Generally, programmable devices, such as fpgas, have two stages of operation; a configuration stage and a user mode stage.

Multiplexed genetic reporter assays and compositions

The invention provides methods for determining the activity of a plurality of nucleic acid regulatory elements. These methods may facilitate, e.g., the systematic reverse engineering, and optimization of mammalian cis-regulatory elements at high resolution and at a large scale.

Semiconductor device having features to prevent reverse engineering

A rom circuit includes a first n channel transistor having an output and having device geometry and device characteristics adapted to bias the output at a predetermined level when a p channel circuit is connected to the first n channel transistor; a pass transistor connected between the output and a data bus, the pass transistor connected to a word line, the word line adapted to turn on the pass transistor when the word line is asserted; and the p channel circuit connected to the data bus and adapted to provide leakage current to charge a gate in the first n channel transistor when pass transistor is turned on.. .

Crm security core

A security core supports a networked banking app for a client application device communicating with a server, such as e.g. A smartphone.

Systems and methods for modeling and analyzing networks

The systems and methods described herein utilize a probabilistic modeling framework for reverse engineering an ensemble of causal models, from data and then forward simulating the ensemble of models to analyze and predict the behavior of the network. In certain embodiments, the systems and methods described herein include data-driven techniques for developing causal models for biological networks.



Reverse Engineering topics:
  • Reverse Engineering
  • Autonomous System
  • Medical Device
  • Integrated Circuit
  • System Resource
  • Computer System
  • Decryption
  • Executable
  • Semiconductor
  • Semiconductor Device
  • Cryptography
  • Encryption
  • Microprocessor
  • Microprocessors
  • Instruction Set Architecture


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Reverse Engineering for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Reverse Engineering with additional patents listed. Browse our RSS directory or Search for other possible listings.


    0.8724

    file did exist - 2692

    0 - 1 - 49